Summary: | <net-analyzer/wireshark-{1.6.12,1.8.4}: multiple vulnerabilities (CVE-2012-{6052,6053,6054,6055,6056,6057,6058,6059,6060,6061,6062}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Jeroen Roovers (RETIRED) <jer> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | netmon, pva, zerochaos |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 436212 | ||
Bug Blocks: |
Description
Jeroen Roovers (RETIRED)
![]() wireshark-1.6.12.ebuild and wireshark-1.8.4.ebuild have been added, but I'd like to hear back from the gnutls-3 users on the blocking bug (and its blocking bugs) before going to stable. Arch teams, please test and mark stable: =net-analyzer/wireshark-1.6.12 =net-analyzer/wireshark-1.8.4 Stable KEYWORDS : alpha amd64 hppa ia64 ppc ppc64 sparc x86 amd64 stable Stable for HPPA. x86 stable ppc stable ppc64 stable CVE-2012-{5592,5593,5594,5595,5596,5597,5598,5599,5600,5601,5602} have all been rejected in favor of new CVE's (coming in next comment). CVE-2012-6062 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6062): The dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. CVE-2012-6061 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6061): The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet. CVE-2012-6060 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6060): Integer overflow in the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet. CVE-2012-6059 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6059): The dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data structure to determine IKEv2 decryption parameters, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. CVE-2012-6058 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6058): Integer overflow in the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Number of Sources value. CVE-2012-6057 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6057): The dissect_eigrp_metric_comm function in epan/dissectors/packet-eigrp.c in the EIGRP dissector in Wireshark 1.8.x before 1.8.4 uses the wrong data type for a certain offset value, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a malformed packet. CVE-2012-6056 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6056): Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count. CVE-2012-6055 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6055): epan/dissectors/packet-3g-a11.c in the 3GPP2 A11 dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a zero value in a sub-type length field. CVE-2012-6054 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6054): The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6. CVE-2012-6053 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6053): epan/dissectors/packet-usb.c in the USB dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 relies on a length field to calculate an offset value, which allows remote attackers to cause a denial of service (infinite loop) via a zero value for this field. CVE-2012-6052 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6052): Wireshark 1.8.x before 1.8.4 allows remote attackers to obtain sensitive hostname information by reading pcap-ng files. alpha/ia64/sparc stable Thanks, everyone. GLSA vote: no. Application crash. Vote: no. Closing noglsa. |